Sciweavers

186 search results - page 32 / 38
» Managing privacy preferences for federated identity manageme...
Sort
View
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
DIM
2008
ACM
13 years 9 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
PERCOM
2004
ACM
14 years 7 months ago
On Negotiating Automatic Device Configuration in Smart Environments
As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethica...
Kay Connelly, Ashraf Khalil
OOPSLA
2007
Springer
14 years 1 months ago
The JikesXen Java server platform
ose of the JVM is to abstract the Java language from the hardware and software platforms it runs on. For this reason, the JVM uses services offered by the host operating system in...
Georgios Gousios
TCGOV
2005
Springer
14 years 1 months ago
Participatory Budget Formation Through the Web
Abstract. We describe a web-based system to support groups in elaborating participatory budgets. Rather than using physical meetings with voting mechanisms, we promote virtual meet...
Jesus Rios, David Ríos Insua, E. Fernandez,...